ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=20"

  • Computer Weekly – 7 November 2017: The ethics of software development

    Sponsored by: TechTarget ComputerWeekly.com

    Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.

  • CIO Trends #7: Nordics

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide features articles outlining how Norway's tax office is fighting economic crime through the use of the latest IT, why Nokia has been at the centre of an investigation following a blackmail scandal and what caused Visa's global payment system to go offline in June 2018.

  • KX High Frequency Data Benchmarking

    Sponsored by: FD Technologies

    This in-depth benchmarking report compares the performance of leading time series databases for high-frequency data workloads. The results show one solution outperforming the others across ingestion, storage, and complex query execution. Read the full whitepaper now to learn more.

  • CW Europe - June-August 2021: Amsterdam reins back datacentre developments over environmental concerns

    Sponsored by: TechTarget ComputerWeekly.com

    The construction of datacentres in the Netherlands' Amsterdam region has accelerated at such a pace that their demands for electricity are causing concern, prompting city authorities and datacentre operator to open a dialogue about sustainable datacentre industry expansion.

  • GEP Spend Category Outlook 2024

    Sponsored by: GEP

    As it’s clear that the challenges plaguing the supply chain will not be going away any time soon, procurement must come up with ways that they can leverage new technology to combat these issues. But of these tools, which are the most effective? Browse this report to learn more.

  • Communicating Culture to Attract Top Talent

    Sponsored by: GEM

    Discover the elements of a strong recruitment marketing strategy to attract top talent. Learn how to define your EVP, create candidate personas, leverage social media, and more. Download this e-book to build an effective inbound recruiting program.

  • What is generative AI? Everything you need to know

    Sponsored by: Dell Technologies & AMD

    In this comprehensive e-guide, you'll gain an understanding of the inner workings of gen AI, including a look at some of the most popular interfaces as well as key use cases. It also includes gen AI FAQs, potential concerns, and ethical considerations. Read on to learn how you can navigate your gen AI journey.

  • Deploying an Intelligent Cloud: 7 Strategies for Success

    Sponsored by: Nutanix

    In this e-book, you'll discover 7 proven strategies to optimize your hybrid multicloud environment and maximize cloud productivity and cost savings. Dive in now to learn how to automate operations, control data services, and leverage AIOps.

  • Liberate Data and Modernize your Network for AI and LLM with Aviatrix

    Sponsored by: Aviatrix Systems

    Aviatrix's cloud networking platform enables enterprises to secure and optimize hybrid networks for AI and large language model workloads. It provides high-performance encryption, deep observability, and cost savings. Learn more about Aviatrix's cloud networking solutions.

  • 5G: APAC guide to next-gen mobile connectivity

    Sponsored by: TechTarget ComputerWeekly.com

    From efforts to turn Malaysia's Langkawi island into a 5G testbed to the impact of the coronavirus outbreak on sales of 5G devices, the guide offers a range of perspectives from different stakeholders in APAC's 5G nascent ecosystem.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.